Searched defs:encrypted (Results 1 - 11 of 11) sorted by relevance

/external/dropbear/
H A Dkeyimport.c355 int encrypted; member in struct:openssh_key
373 ret->encrypted = 0;
423 ret->encrypted = 1;
467 if (ret->encrypted && ret->keyblob_len % 8 != 0) {
501 ret = key->encrypted;
529 if (key->encrypted) {
530 errmsg = "encrypted keys not supported currently";
987 * - string cipher-type (tells you if key is encrypted)
988 * - string encrypted-blob
995 * The encrypted blo
[all...]
/external/ipsec-tools/src/racoon/
H A Disakmp_inf.c139 int encrypted;
143 encrypted = ISSET(((struct isakmp *)msg0->v)->flags, ISAKMP_FLAG_E);
147 if (encrypted) {
180 if (encrypted) {
262 /* make sure the packet was encrypted after the beginning of phase 1. */
274 "%s message must be encrypted\n",
295 msgid, encrypted);
300 msgid, encrypted);
331 isakmp_info_recv_n(iph1, notify, msgid, encrypted)
335 int encrypted;
138 int encrypted; local
[all...]
/external/qemu/
H A Dblock_int.h120 int encrypted; /* if true, the media is encrypted */ member in struct:BlockDriverState
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
H A Dikev2_common.c272 wpa_printf(MSG_INFO, "IKEV2: Invalid encrypted "
389 payloads->encrypted = pdata;
498 const u8 *encrypted, size_t encrypted_len,
510 if (encrypted == NULL) {
534 iv = encrypted;
536 end = encrypted + encrypted_len;
574 wpa_printf(MSG_INFO, "IKEV2: Invalid padding in encrypted "
495 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument
H A Dikev2_common.h320 const u8 *encrypted; member in struct:ikev2_payloads
332 const u8 *encrypted, size_t encrypted_len,
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Dikev2.c453 const u8 *encrypted,
463 hdr, encrypted, encrypted_len,
500 if (pl->encrypted) {
503 if (ikev2_process_sa_init_encr(data, hdr, pl->encrypted,
507 "encrypted payload");
727 &data->keys, 0, hdr, pl->encrypted,
451 ikev2_process_sa_init_encr(struct ikev2_initiator_data *data, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, u8 next_payload) argument
/external/wpa_supplicant/
H A Deap.c934 * @encrypted: Whether the packet is for encrypted tunnel (EAP phase 2)
942 int encrypted)
961 } else if (!encrypted && config->anonymous_identity) {
941 eap_sm_buildIdentity(struct eap_sm *sm, int id, size_t *len, int encrypted) argument
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Deap.c954 * @encrypted: Whether the packet is for encrypted tunnel (EAP phase 2)
961 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted) argument
979 } else if (!encrypted && config->anonymous_identity) {
/external/zlib/contrib/minizip/
H A Dunzip.c147 int encrypted; member in struct:__anon6240
490 us.encrypted = 0;
1184 s->encrypted=1;
1287 if(s->encrypted)
/external/openssl/crypto/pkcs7/
H A Dpkcs7.h212 PKCS7_ENCRYPT *encrypted; member in union:pkcs7_st::__anon3164
/external/openssl/include/openssl/
H A Dpkcs7.h212 PKCS7_ENCRYPT *encrypted; member in union:pkcs7_st::__anon3208

Completed in 107 milliseconds